iOS forensics (SQLiteDB)

Applying the fundamentals of iOS forensics for analysing an actual iPhone in “Operation JustEncase”:

Your crime taskforce has been investigating into the root cause of a recent outbreak of criminal activity. Although you’ve apprehended a Mr Brandon Hunter, you need to analyse the filesystem dump of his iPhone to find a lead into the gang.

Although the suspect’s phone is locked with a passcode, you have been able to use a recent “Lockdown Certificate” from the suspect’s computer, allowing you to create a logical file system dump from an iPhone backup he made recently.


Open DB Browser (SQLite), click on open database option and select sms, then message:

open db

Who was the recipient of the SMS message sent on 23rd of August 2020? And what did the SMS message say?

first name of the other person in the contacts

Looking at the address book, what is the first name of the other person in the contacts? And what is their listed “Organization”?

name of other person and their listed "Organization"

Investigate their browsing history, what is the address of the website that they have bookmarked?

address of the website that they have bookmarked

The suspect received an email, what is the remote_id of the sender?

remote_id of the sender

What is the name of the company on one of the images stored on the suspects phone?

name of the company on one of the images

What is the value of the cookie that was left behind?

value of the cookie